Top Cybersecurity Company A-LIGN Focuses on Innovation (The Software Report)

A-LIGN continues to take a proactive, people-first approach as security and compliance as new technology and cyber threats emerge. Continue reading “Top Cybersecurity Company A-LIGN Focuses on Innovation (The Software Report)”

Featured CLIMBER:
Tony Bai

Employees at A-LIGN take many different paths throughout their journey – that’s why we sat down with Tony Bai, Federal Practice Lead at A-LIGN, to talk about how he uses his cybersecurity and military expertise as a thought leader and his advice to veterans considering a career in cybersecurity. Continue reading “Featured CLIMBER:
Tony Bai”

Don’t Get Reeled In: How to Prevent Phishing Scams

Phishing scams are a serious threat to an organization, and they’re increasing in scope, complexity and number – but that doesn’t mean you’re helpless to defend yourself. In fact, it’s easier than ever to proactively protect your organization from threats by following some simple tips.

Continue reading “Don’t Get Reeled In: How to Prevent Phishing Scams”

Using HITRUST for Industries Beyond Healthcare

Organizations around the world, especially ones in the HITRUST XChange program, are moving to quickly implement the HITRUST Common Security Framework (CSF) for their organization. With the recent HITRUST CSF v9.2 update, organizations across all industries – not just healthcare – can benefit greatly from the HITRUST framework.

Continue reading “Using HITRUST for Industries Beyond Healthcare”

A Quick NIST Cybersecurity Framework Summary

Running an organization today means not only performing expected business requirements and generating revenue, but also defending yourself against an endless onslaught of cybersecurity threats. The NIST Cybersecurity Framework is designed to help you grow your organization while defending yourself from cyberattacks. Continue reading “A Quick NIST Cybersecurity Framework Summary”

Minimizing Data Risks in 2019

In the world of cyber risk and security, the biggest concerns for chief audit executives (CAEs) in the coming year are risks surrounding data and analytics. According to a Gartner study that surveyed 144 CAEs, Gartner was able to determine the major risks that are facing boards, audit committees and executives in the new year, many of which stem from the growth of digital business models and data usage.

The amount of data being collected and processed at any given moment is increasing rapidly. Studies show that over 2.5 quintillion bytes of data is being created every day – and it’s growing with the inception of the Internet of Things. In fact, 90% of all the data ever created worldwide was generated in just the last two years. With so much data being created in the pursuit of digital business model growth, it comes as no surprise that public and regulatory skepticism and scrutiny is at an all-time high. As a result, CAEs are closely watching the heightened risks around data governance.

Third-Party Risk

The state of modern business and digital initiatives means that organizations rely on third-party vendors. The more partners connected to an organization, the higher the risk due to careless employees or malicious attacks externally and internally. Nearly 70 percent of CAEs report third-party risks as a top concern for their organization.

By having your vendors complete regular security questionnaires and assessments, such as SOC 2 examinations, you can help mitigate risk, increase visibility into third-party operations and be better prepared to combat potential risks.

To manage third-party risk, organizations should develop a robust vendor management program and conduct regular vendor management reviews. Vendor management reviews involve the identification of all vendors, as well as a ranking of the risk that they pose to your organization. This process can help your organization understand when supplemental assessments, like SOC 2 and penetration testing services, can be helpful to better protect your organization. Other ways to combat threats include assigning internal audit teams to investigate third-party data handling regulatory requirements, as well as evaluate third-party contracts and compliance efforts.

Data Governance

The world of data usage and protection has been under scrutiny in recent years thanks to a series of high-profile data breaches and the rise of privacy regulations like the GDPR.

With data creation and usage growing by the day, it is imperative that companies have data governance frameworks to reduce risks and combat security threats. A data governance framework is the model for how data is managed within an organization. The framework aligns policies, requirements, and controls with the needs of users and stakeholders to manage the data within an organization.

Data Privacy

Data privacy remains a top concern for CAEs and end-users, having been highlighted through flaws in data privacy frameworks. To combat this growing problem, a concentrated push is being made by organizations to create policies and procedures to safeguard data and protect companies and consumers. As governments continue to pass stronger data protection laws, it’s imperative to routinely undergo audits, review policies and procedures to ensure that sensitive data is protected and build frameworks with privacy in mind. As we have seen routinely, even companies as expansive as Facebook are not immune to data breaches.

For organizations looking to ensure the privacy of information, SOC 2 Assessments that include the Privacy Trust Service Criterion can exhibit your commitment to the privacy of personal information that is collected, stored, used, transferred, disclosed or destroyed by your organization. ISO 27001 assessments help organizations implement, manage and maintain information security, while ISO 27018 focuses on the protection of personal data in the cloud.

For organizations that handle EU resident data, GDPR assessments can help your organization avoid noncompliance fines, while also assessing your organization’s current data protection and privacy environment and providing a detailed assessment of gaps that require remediation.

Preparing for 2019 with A-LIGN

With years of experience building compliance frameworks for organizations of all sizes, A-LIGN is prepared to help you avoid data and analytics fears. By building a customized compliance roadmap for your business, A-LIGN prepares your organization not only for today’s risks but also provides you with best and next practices to offer a competitive differentiator.

Are you ready to prepare your organization for data and analytics threats?

Contact A-LIGN at 1-888-702-5446 to speak with one of our cybersecurity professionals.

Mitigating Manufacturing Security Threats

It used to be that only certain sectors, such as healthcare and government, were targets of cybercrime. However, now with the widespread advancements in technology, cybercriminals have expanded their focus and are pursuing new industries such as manufacturing. Continue reading “Mitigating Manufacturing Security Threats”

3 Security Trends that will Continue in 2017

security-commerce-trendsWith the ushering in of another new year, I find myself acting nostalgic, wondering where the previous year went and of course pondering the year ahead. Here are three security and commerce trends which will continue in 2017.

  1. Healthcare Data Breach

According to the Privacy Rights Clearinghouse, healthcare data breaches in 2016 comprised of 290 incidents that were reported or discovered. In 2015, there were only 82, resulting in a 254% increase in 2016! Healthcare data has a high monetizability and will continue to be targeted, so we can expect this trend to continue in 2017.

An important factor in the increase of data breaches is due to organizations not having security policies and procedures in place to protect their infrastructure. I’ve observed many healthcare organizations and service providers talk about having proper security assessments and penetration testing performed, even discussing the importance of a HITRUST certification, but only a handful actually have them done. Knowing where the vulnerabilities lie within your organization is a critical component in enhancing the security of your data.

  1. Hospitality – A Hacker’s Playground

Hospitality is another targeted sector that has had hundreds of incidents of data compromised and we will continue to see this happen in 2017. For many years I was able to work with breached merchants and advise them regarding security and forensic options. Unfortunately, many of these entities were the brand name hotels you and I often use during the course of standard business and personal travel.

I’ve observed the Hospitality industry continue to lag behind the retail sector both in terms of technology, as well as process and policy. PCI compliance in this sector isn’t necessarily an afterthought but is an overinflated self-assessment until the data breach occurs.

A classic example of a weak security policy that was in place at a prominent hotel that I stayed at during a business trip, is a photo that reads, If The Computer Shuts Down, the PW is P@ssword!. The photo illustrated a label on a hotel monitor with the password to login. Not only is this representative of a bad password policy but the entirety of the security culture at the hotel. This is the tip of the iceberg in the hospitality sector and will continue to facilitate hacks and data compromises of all sorts in 2017.

  1. A Positive Trend – EMV and US Retailers

EMV, a technical standard created by Europay, MasterCard, and Visa, increases the security of using credit cards during payment transactions. Credit card fraud is usually caused by “leaky” POS systems, but the use of EMV cards, or smart cards that have a chip or PIN, makes it difficult to clone a card and steal data.

In 2017, US retailers employing chip card readers will dramatically increase due to merchant liability incentives from Visa. By the end of the year, you should be able to insert your card in at least 4 out of 10 merchants visited. The one exception is gas pumps since Visa has granted exceptions until 2020, but many chains such as Maverik will start implementing the chip card readers sooner than later.

Whether your business is healthcare, hospitality or retail, these trends will continue to impact commerce and security this year. For more information on how you can improve your overall security stance and be prepared for 2017, contact us at to speak to one of our security professionals.

Work for It: Earning Our Clients’ Business

HandcuffedAuthor: Scot Thrower, Business Development Manager at A-LIGN.

Feeling stuck in a relationship with your current audit and security solutions provider? It doesn’t have to be that way! A-LIGN provides compliance solutions without multi-year contracts or strings attached. While other providers lock you into costly, multi-year contracts that may lead to legal issues if you are not satisfied, A-LIGN offers its services without multi-year contractual obligations while maintaining flat fixed fees over a three-year term.

Many of our clients have told us that one of the reasons they made the switch to A-LIGN is because we do not make them execute a multi-year contract.  Once you’re locked in, the provider may not feel the need to give your business 100% of their time, effort, and energy.  There’s little or no penalty for supplying your firm with late or sub-par work.  This shifts power into the hands of the provider, not you, the client.  A-LIGN does not require its clients to sign multi-year contracts because we want to earn your business for each and every engagement, year after year.

At A-LIGN, our goal is to relentlessly exceed the expectations of our clients.  Our team of audit and security professionals will strive to ensure the quality of the work performed goes beyond the necessary.  We aim to deliver a quality final report, on time, while minimizing the strain on your resources.  A-LIGN will be all in for you, year in and year out, without ever needing a multi-year contract to keep you as one of our valued clients.

A-LIGN Offers:

  • Excellent service without multi-year contractual obligations
  • Competitive, fixed-fee pricing that stay flat over a term of three years
  • Innovative solutions for the changing audit landscape
  • Top-notch and verifiable client satisfaction

If you are receiving anything less than exceptional service from your current provider, please call us at 888-702-5446 or email

More Passwords, More Problems: A Look into Biometric Authentication

What’s your password? Studies show that you likely use more than 15 different passwords, but more than half of you admit to using a weak password. So how do companies fare with inconsistent password usage and standardization? Even companies with incredible security practices can become vulnerable due to a forgetful employee who leaves their password on a sticky note under their mouse pad, or someone using the incredibly hard to crack password “password”. Hackers are becoming more adept, and as a result, companies must improve their digital security.

While technology has continued to improve, things like the traditional QWERTY keyboard have not changed in decades. Passwords are becoming clunky, laborious things that must be carried in the memory of the user and while two-factor authentication assist in ease, it is typically just a different combination of characters that takes up more time.

We get questions from our clients all of the time: How can we improve our own security? In light of data breaches at eBay (145 million users), Adobe (36 million users), JP Morgan Chase (76 million users), and many, many others – passwords have been at the forefront of the security discussion. Let’s take a moment to look at the future of password and identity protection, and what implications that may have on security.

The Pros and Cons of Biometric Identification

Fingerprint Biometrics

Fingerprint biometrics have gained incredible popularity since Apple unleashed it on the iPhone-using masses (94 million people use an iPhone), but they aren’t the only ones using the technology. Android mobile devices have also adopted the technology, and it is anticipated that approximately 50% of all mobile devices will move towards this technology by 2019. But how secure is the convenient, unforgettable, unduplicatable security? Maybe not as secure as you’d think.
With some technology companies leaving fingerprint data unencrypted, hackers are suddenly able to access print images remotely at a large scale. Phone hackers aside, what happens if your fingerprint data at a government agency is breached and suddenly anyone has access to your prints? You can’t exactly change your prints once they have been compromised, and experts have suggested that a simply high resolution photo of your fingers could be enough to gain entry to fingerprint-protected devices.

Facial Recognition

If we recognize each other through our faces, why can’t our technology learn to do it as well? Some credit card companies were even considering the complete removal of credit cards and moving wholly to facial recognition software.

However easy this technology would make our lives, it is unfortunately one of the least reliable and efficient technologies available at this time for personal identification purposes. A simple tilt in the head angle can throw off the technology, as can sunglasses, a change in hair, items obscuring the face and skin color, to name a few. Outside of the current technological hurdles, hackers are able to trick facial recognition through use of high-quality photographs, similar looking people and the hacking of the entire system.

Iris Scans

In every science fiction movie, there’s a retina scan that unlocks a door. But it may not be just science fiction anymore. Citibank is currently working with partners EyeLock LLC and Diebold in order to develop a card-less, screen-less, self-service ATM. All transactions occur on the mobile phone using near field communication or QR code technology, while the customer is authenticated using the EyeLock iris sensor.


In a similar vein, Microsoft recently released two phones featuring iris scanning authentication. But what are the risks of the new technology? The systems are often fooled by a high-quality image of the eye, making it an easy target for hackers. Until live-tissue verification exists for all of the technologies previously mentioned, it will continue to be easily tricked by hackers with replicated imagery.

Voice Biometrics

“Xbox, on.”

Voice command opens up a hands-free universe where logging into anything is as easy as a few simple words. One of the benefits is that authentication over the phone allows for remote authentication. But how long until a cybercriminal gets you on the phone, talking, to remotely unlock your account for them without your knowledge?

Voice command has other limitations. For example, users may not want to share their actions with those on the bus or in a quiet office. Or, consider struggling to log into an account at a loud rock show. In addition, vocal recordings are able to fool some of the more basic voice biometrics machines.

Where do we go from here?

The options aren’t all bad, but all pose their own risks. But what if you could combine any or all of those authentication factors? Combining factors allows for certain identifiers to be used in certain situations. For example, fingerprint and voice authentication when unlocking your vehicle – use fingerprint when you have your hands free and voice when you have your hands full.

The ability to pick factors that work for your lifestyle and the potential risk offers a glut of opportunity for information security experts to improve data security. Because we would all be better off in a world where the easy account reset questions no longer exist.